机译:浏览器缓存中的人:通过浏览器缓存中毒持续进行HTTPS攻击
School of computing, National University of Singapore, 13 Computing Drive, COM1 #3-27, Singapore 117417;
School of Electronic and Information Engineering, Beihang University, 37 Xueyuan Road, Haidian District, Beijing 100191, China;
Advanced Digital Sciences Center, 1 Fusionopolis Way, #08-10 Connexis North Tower, Singapore 138632;
School of computing, National University of Singapore, 13 Computing Drive, COM1 #3-27, Singapore 117417;
School of Electronic and Information Engineering, Beihang University, 37 Xueyuan Road, Haidian District, Beijing 100191, China;
School of computing, National University of Singapore, 13 Computing Drive, COM1 #3-27, Singapore 117417;
Browser cache poisoning; Web security; Browser vulnerability; HTTPS; Script injection;
机译:HTTP-sCAN:通过从嘈杂的Web日志中建模Web浏览行为的多种功能来检测HTTP泛洪攻击
机译:我知道你去过哪里:通过浏览器缓存进行地理推理攻击
机译:深度防御防御方法,可保护用户浏览免遭高速缓存攻击
机译:HTTPSLock:使用缓存的Javascript在未修改的浏览器中强制执行HTTPS
机译:使用PRISM模型检查Kaminsky DNS缓存中毒攻击。
机译:一种新颖的保护性框架可克服基于HTTP的拒绝服务攻击和分布式拒绝服务攻击
机译:HTTpsLock:使用缓存Javascript在未修改的浏览器中实施HTTps